, , , , , , , , , , , , , , , ,

Office 365 SSO Security Guidance: Single sign-on and remote access

Office 365 Single Sign-On

Office 365 SSO: The secure configuration of this cloud-hosted service aligns with government’s guidance on implementing the Cloud Security Principles. You can find out more regarding implementation of Federation in order to Restrict Access to Office 365. 1. What is Office 365 SSO (Single Sign-On)? A Microsoft Online user usually signs in using the username and […]

, , ,

Get inventive when you select suppliers and partners!

At the risk of this becoming another rant, I’ll keep it brief. Many organisations and leaders of organisations bang on and on about how great they are. Some are even right to do so. But from my experience what an organisation says about themselves tends to only contain the good news, especially where organisations, due […]

, , , , , ,

Microsoft Office 365 or . . . . Google Apps?

Funnily enough I’m asked this question more and more frequently, “Which is better, Google Apps or Microsoft Office 365?”. Other cloud collaboration & communication services are available, however, this is my opinion and not an all encompassing review of the services. My immediate answer is always, “Office 365”. Bear with me here and I’ll try […]

, , , , , ,

Exchange Online Office 365 Reports with Excel and OData | HowTo

Open Office 365 reports from directly in Excel and get your Exchange Online reporting! Predefined reports in the Office 365 Admin Portal are fine for overview, however, if you require more granularity then Office 365 reporting has to be performed via PowerShell or some other development language to access the Office 365 Exchange Online reporting […]

, ,

IP Telephony – What is it?

IP Telephony, Phone

We asked Trevor, a relative newcomer to IP Telephony, to explain what it is, what it can do, and how you can benefit from it, in his own words: A question most often asked by many people, including myself when I first heard of IP Telephony. From my research it has nothing to do with the […]

, , , , ,

Whitelist a domain in Office 365 Exchange Online | HowTo

We get asked this particularly irksome issue by clients from time to time. It’s almost always described as “all of the emails from our most important client are going into Spam” or perhaps “the world is about to end and I’ve found the most important email ever in my Junk Folder”. Ordinarily this can be […]

, , , ,

It’s not about capacity, it’s what you do with it.

This week, BT had an outage. Hundreds of thousands of customers were left without internet or phone services. In the aftermath, it was discovered that the cause was a broken router, and this single point of failure was responsible for widespread disruption, and the loss of incalculable productive hours and revenue. Additionally, BT’s customer contact […]

, , , , ,

Eating your own dog food!

Eating your own dog food

Goodness, it’s been ever such a long time since I last posted. We’ve been busy. I wish I could say we’ve been busy acquiring new customers and altering many a paradigm. The reality is much more mundane but equally as important. We moved into our own office on the 1st December 2015, and as it […]

, , , , ,

Passwords, encryption and good practice

Passwords, encryption and good practice

Passwords should be complex and changed regularly. Encryption should be implemented for any business critical information and especially for any information which is mobile or transported in any fashion. Why then do we still get asked the question “why do we need to change our passwords so often” and “do we have to have such […]

, ,

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud

Cyber security and cyber fraud. Look, there is no easy answer to this, albeit many pundits, commentators and politicians would have you believe there is. First of all, I’m a technologist, I love it. However, technology does not hold the key to the solution to this issue. The simplistic application of some ethereal technical solution […]